at 05:39:51PM +, Yury Mazin via openssl-users wrote:
> I have a question based on the response provided to me:
>
> My question is why following openssl commands (version 1.1.1f) return
> those TLSv1.3 ciphers as offering no authentication and no encryption?
It does not. Yo
04, 2020 at 07:00:01PM +0000, Yury Mazin via openssl-users wrote:
> Thank you Benjamin,
>
> According to OpenSSL , aNULL stands for no-authentication.
Specifically, SSL 3.0 through TLS 1.2 ciphers in which the server and
client exchange no certificates, and the TLS handshake consists larg
, Sep 04, 2020 at 07:00:01PM +, Yury Mazin via openssl-users wrote:
> Thank you Benjamin,
>
> According to OpenSSL , aNULL stands for no-authentication.
Specifically, SSL 3.0 through TLS 1.2 ciphers in which the server and
client exchange no certificates, and the TLS handshake consist
From: Benjamin Kaduk
Sent: Thursday, September 3, 2020 5:12 PM
To: Yury Mazin
Cc: openssl-users@openssl.org
Subject: [EXTERNAL] - Re: Question about TLS 1.3 and openssl -cipher aNULL
option
On Thu, Sep 03, 2020 at 11:45:28PM +, Yury Mazin via openssl-users wrote:
> He
Hello,
We have a server was originaly using OpenSSL 1.0.2h.
Server is configured to use SSL ciphers as following
ALL:!aNULL:!ADH:!EDH:!eNULL:!EXPORT
When openssl client tries to connect to this server with command
openssl s_client -connect localhost:8101-cipher aNULL
it fails, because any aNULL